SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Private Content
 

When developer's api simplify user mode rootkits developing.

by Information Security Researcher at Hakin9 Magazine on Sep 10, 2012

  • 609 views

This is a series of articles about shell extensions that enhance high-level features of any operation system. However, such possibilities not only enrich platform but simplify developing trojans, ...

This is a series of articles about shell extensions that enhance high-level features of any operation system. However, such possibilities not only enrich platform but simplify developing trojans, exploits that leads to the new security holes. Mostly this kind of extensions are known as usermode rootkits.
http://hakin9.org/theultimat/

Statistics

Views

Total Views
609
Views on SlideShare
502
Embed Views
107

Actions

Likes
0
Downloads
7
Comments
0

3 Embeds 107

http://sto-strategy.com 86
http://s-t-o.squarespace.com 13
http://www.behance.net 8

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

When developer's api simplify user mode rootkits developing. When developer's api simplify user mode rootkits developing. Document Transcript